ARTICLES

All About The Massive Email Accounts Data Breach

Recently, a massive data breach of 773 million email addresses and 21 million passwords was exposed. Read on to know more about the data...

Why Facebook App Cannot be Deleted in Some Phones

After Facebook tied up with Samsung and other handset makers, some users' recently complained that Facebook app cannot be deleted in these smartphones. Read...

Why Google Removed Some Apps from its Play Store

Recently, Google removed 85 malicious apps from Android Play Store after security researchers found them to be dangerous. Read on to know more... Recently, Google...

All About the Recent Data Breach at Amazon India

Recently, Amazon India discovered a data breach that left exposed some of its sellers’ private financial information to other users. Read on to know...

NEWS

New variant of RogueRobin trojan uses DNS tunneling

Source: Cyware | By Ryan Stewart New variant of RogueRobin trojan uses DNS tunneling to communicate with C2 server • The infamous DarkHydrus threat actor group...

Malicious websites could exploit Extension APIs to grab browser data

Source: Cyware | By Ryan Stewart • APIs for 197 browser extensions are under the scanner for security issues, said a researcher. • Along with making...

Synopsys Unveils Coverity Enhancements to Extend Breadth, Depth, and Scalability

Synopsys Unveils Coverity Enhancements to Extend Breadth, Depth, and Scalability of Enterprise Application Security Testing Synopsys, announced the availability of a new version of its...

Check Point Researchers Reveal Vulnerabilities

Check Point Researchers Reveal Vulnerabilities that Would Allow Hackers to Take Over Fortnite Gamers' Accounts, Data and In-Game Currency Vulnerabilities found would let threat actors...

INTERVIEWS

Interview of Paul Garvey, Vice President of IBM Security, Asia Pacific

In this interview, Paul Garvey, Vice President of IBM Security, Asia Pacific, explains how IBM is gearing up to meet the security challenges and...

Interview with Alisdair Faulkner, Chief Products Officer, ThreatMetrix, U.S

Alisdair Faulkner, Chief Products Officer, ThreatMetrix, explains how his organisation secures the digital identity of business and government enterprises through digital identity intelligence and...

Interview of Thiagarajan, Director – IT, India & Asia, IMI Critical...

With the growing threat landscape in cyber space, how matured the critical industry sector is in India to protect their business sensitive data? The critical...

Interview with Sharad Sadadekar, CISO, HDFC Life Insurance

With the growing threat landscape in cyber space, how HDFC Life Insurance has been managing to protect their business sensitive data? Financial organisations are entrusted...

Keyur Desai, CIO – ESSAR Ports & Shipping, says that user...

With the growing threat landscape in cyber space, how Essar has been managing to protect their business sensitive data? While the threat landscape has been...

INDUSTRY INPUTS

Safety Expertise in the Digital Age for Critical Infrastructures

As Industrial plants have become much more complex, we look at some of the critical requirements and safety expertise for critical infrastructures and Industrial...

Significance of Trust in Information Technology

In this brief article, Ticky Thakkar explains the significance of trust in various technologies with respect to security. Trust is defined as “a firm belief...

OPINION Patches, Data and Patient Security

Security and medicine are increasingly intertwined, especially in today's highly regulated world where more people care for privacy and data protection. However, with companies...

Confronting The Automotive Cyber Threat

The first 10 weeks of 2018 have already produced a wide and sophisticated range of automotive hacks for some of the world’s leading brands. As...